Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36460: CWE-805 - Buffer Access with Incorrect Length Value in Broadcom BCM5820X

0
High
VulnerabilityCVE-2025-36460cvecve-2025-36460cwe-805
Published: Mon Nov 17 2025 (11/17/2025, 22:47:21 UTC)
Source: CVE Database V5
Vendor/Project: Broadcom
Product: BCM5820X

Description

Multiple out-of-bounds read and write vulnerabilities exist in the ControlVault WBDI Driver Broadcom Storage Adapter functionality of Dell ControlVault3 prior to 5.15.14.19 and Dell ControlVault3 Plus prior to 6.2.36.47. A specially crafted WinBioControlUnit call can lead to memory corruption. An attacker can issue an api call to trigger this vulnerability. This vulnerability is triggered when submitting a `WinBioControlUnit` call to the StorageAdapter with the ControlCode 2 (`WBIO_USH_GET_IDENTITY`) with an improper `ReceiveBuferSize` value.

AI-Powered Analysis

AILast updated: 11/24/2025, 23:11:33 UTC

Technical Analysis

CVE-2025-36460 is a vulnerability classified under CWE-805, indicating buffer access with incorrect length values, specifically in the Broadcom BCM5820X component integrated into Dell ControlVault3 and ControlVault3 Plus devices. The flaw arises from multiple out-of-bounds read and write conditions within the ControlVault WBDI Driver's Storage Adapter functionality. An attacker with local privileges can exploit this vulnerability by issuing a crafted WinBioControlUnit API call to the StorageAdapter, particularly using ControlCode 2 (WBIO_USH_GET_IDENTITY) with an improper ReceiveBufferSize parameter. This malformed input causes the driver to perform memory operations beyond allocated buffer boundaries, leading to memory corruption. The consequences of such corruption include potential arbitrary code execution, privilege escalation, or denial of service. The vulnerability requires low attack complexity but does need local privileges and user interaction, as indicated by the CVSS vector (AV:L/AC:L/PR:L/UI:R). The CVSS score of 7.3 reflects a high severity due to the combined impact on confidentiality, integrity, and availability. Currently, there are no known exploits in the wild, and no patches have been linked yet, emphasizing the need for vigilance and prompt remediation once updates are released.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially those relying on Dell hardware with Broadcom BCM5820X components for biometric authentication and security functions. Exploitation could allow attackers to corrupt memory, potentially leading to unauthorized access to sensitive biometric data, system compromise, or disruption of authentication services. This could undermine trust in identity verification systems, impacting sectors such as finance, healthcare, government, and critical infrastructure. The requirement for local privileges and user interaction somewhat limits remote exploitation but does not eliminate risk, particularly in environments where insider threats or social engineering attacks are plausible. The high impact on confidentiality, integrity, and availability could result in data breaches, operational downtime, and regulatory non-compliance under GDPR and other European data protection laws.

Mitigation Recommendations

Organizations should prioritize monitoring for updates from Dell and Broadcom addressing this vulnerability and apply patches immediately upon release. Until patches are available, restrict access to the affected ControlVault devices and the WinBioControlUnit API, limiting usage to trusted users and processes. Implement strict local access controls and user privilege management to reduce the risk of exploitation. Employ endpoint detection and response (EDR) solutions to monitor for anomalous API calls or memory corruption indicators. Conduct user awareness training to mitigate social engineering risks that could lead to local exploitation. Additionally, review and harden biometric authentication configurations to minimize exposure. Regularly audit systems for unauthorized changes or suspicious activity related to ControlVault components.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2025-04-15T21:17:08.088Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ba72ebb922d226277cd87

Added to database: 11/17/2025, 10:52:30 PM

Last enriched: 11/24/2025, 11:11:33 PM

Last updated: 1/7/2026, 5:22:50 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats